bnagy / cgasmLinks
We're insanely passionate about command line asm documentation in the cloud, and we're crushing it!
☆382Updated 5 years ago
Alternatives and similar repositories for cgasm
Users that are interested in cgasm are comparing it to the libraries listed below
Sorting:
- An instruction trace visualisation tool for dynamic program analysis☆371Updated 2 years ago
- random brain dumps☆350Updated 8 years ago
- Interactive Disassembler GUI - This Repository is NOT a supported MongoDB product☆250Updated 8 years ago
- Linux bind shell with anti-reverse engineering techniques☆287Updated 8 years ago
- 🌪️ Application fuzzer☆437Updated 2 years ago
- Survey of program analysis research with a focus on machine code☆564Updated 5 years ago
- A GDB toolbox for low-level debugging☆137Updated 11 years ago
- capstone based disassembler for extracting to binnavi☆229Updated 9 years ago
- An optimizing decompiler☆729Updated 4 years ago
- Conference slides and White-papers☆358Updated 5 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆251Updated 6 years ago
- Source graveyard and random candy for radare2☆250Updated 2 weeks ago
- Visualization of heap operations.☆614Updated 10 months ago
- Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API☆407Updated 4 years ago
- Open source library that implements translator and tools for REIL (Reverse Engineering Intermediate Language)☆510Updated 4 years ago
- An open source interactive disassembler☆1,074Updated 6 years ago
- Visual reverse engineering tool.☆283Updated 8 years ago
- The DrK Attack - Proof of concept☆347Updated 3 years ago
- Implementations of program analysis tools with a focus on machine code☆208Updated 11 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆187Updated 3 years ago
- An amd64 symbolic emulator☆312Updated 4 years ago
- Radare Congress Stuff☆215Updated 11 months ago
- Runtime Process Infection Made Easy☆187Updated last year
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287Updated 9 years ago
- Deprecated Binary Ninja prototype written in Python☆524Updated 5 years ago
- The 'exploitable' GDB plugin☆743Updated 3 years ago
- Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone☆322Updated 6 years ago
- Exercises for learning Reverse Engineering and Exploitation.☆388Updated 6 years ago
- Visual reverse engineering tool. Veles is better, use it. Don't use this.☆590Updated 4 years ago
- A tool to help you write binary exploits☆605Updated 6 years ago